CN120111569A - Source coding method, device, communication equipment and readable storage medium - Google Patents
Source coding method, device, communication equipment and readable storage medium Download PDFInfo
- Publication number
- CN120111569A CN120111569A CN202311657295.5A CN202311657295A CN120111569A CN 120111569 A CN120111569 A CN 120111569A CN 202311657295 A CN202311657295 A CN 202311657295A CN 120111569 A CN120111569 A CN 120111569A
- Authority
- CN
- China
- Prior art keywords
- data
- source coding
- source
- transmitted
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a source coding method, a device, a communication device and a readable storage medium, which belong to the technical field of wireless communication, and the source coding method of the embodiment of the application comprises the steps that a first communication device receives a first message, wherein the first message comprises a first triggering condition for source coding data to be transmitted; and the first communication equipment determines whether to perform source coding on the data to be transmitted according to whether the first trigger condition is met or not.
Description
Technical Field
The application belongs to the technical field of wireless communication, and particularly relates to a source coding method, a source coding device, communication equipment and a readable storage medium.
Background
Data is one of the core elements of a mobile network. A User Equipment (UE), also called a terminal, a radio access network and a core network may generate mass data. The data, besides user plane data, also includes a large amount of mobile network internal data, for example, a terminal or a base station device of a sixth generation mobile communication technology (6th Generation Mobile Communication Technology,6G) system can measure a received signal while transmitting radio waves for communication, so as to perform wireless sensing on a radio wave propagation environment and a target object therein, obtain sensing data such as position, speed, direction, material, imaging and the like of the target object, and support abundant sensing applications and scenes. Meanwhile, with research on the use of the fifth generation mobile communication technology (5th Generation Mobile Communication Technology,5G) network artificial intelligence (ARTIFICIAL INTELLIGENCE, AI), such as AI model of Channel State Information (CSI) feedback, beam management and positioning, user behavior prediction, etc., AI model training requires a large amount of mobile network internal data, and AI models as small as several tens of kbytes to several hundreds of mbytes need to be transmitted among the UE, radio access network, and core network. 6G, as a ubiquitous system of coupling, produces a significant amount of valuable underlying data information in supporting physical and digital world connections. Compared with 5G which only provides limited data services such as UE positioning and network information opening, 6G provides wireless sensing and positioning, and network information opening is enhanced. In addition, the 6G can also collect industry public information such as various sensor information, geographic information system (Geographic Information System, GIS) information and the like, and enable thousands of industries to perform department, so that repeated collection of the data by various industry applications is avoided.
Therefore, as the mobile network internal data generated by the network functions of the UE, the radio access network and the core network increases, the transmission resource overhead for collecting and consuming data between the functions increases.
In order to solve the shortage of storage resources and transmission resources, a source coding method supporting data transmitted in a mobile network needs to be considered, thereby saving the storage resources and transmission resources.
Disclosure of Invention
The embodiment of the application provides a source coding method, a device, communication equipment and a readable storage medium, which can solve the problem of how to support the source coding method of data transmitted in a mobile network.
In a first aspect, a source coding method is provided, including:
the first communication equipment receives a first message, wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted;
And the first communication equipment determines whether to perform source coding on the data to be transmitted according to whether the first trigger condition is met or not.
In a second aspect, a source coding method is provided, including:
The second communication device sends a first message comprising a first trigger condition for source coding the data to be transmitted.
In a third aspect, there is provided a source coding apparatus comprising:
the first receiving module is used for receiving a first message, and the first message comprises a first triggering condition for performing source coding on data to be transmitted;
And the first determining module is used for determining whether to perform source coding on the data to be transmitted according to whether the first trigger condition is met.
In a fourth aspect, there is provided a source coding device,
The first sending module is used for sending a first message, and the first message comprises a first triggering condition for performing source coding on data to be transmitted.
In a fifth aspect, there is provided a communication device comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method according to the first or second aspect.
In a sixth aspect, a communication device is provided, including a processor and a communication interface, where the communication interface is configured to receive a first message, where the first message includes a first trigger condition for performing source coding on data to be transmitted, and the processor is configured to determine whether to perform source coding on the data to be transmitted according to whether the first trigger condition is met.
In a seventh aspect, a communication device is provided, including a processor and a communication interface, where the communication interface is configured to send a first message, where the first message includes a first trigger condition for source encoding data to be transmitted.
In an eighth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor, performs the steps of the method according to the first aspect or performs the steps of the method according to the second aspect.
In a ninth aspect there is provided a wireless communication system comprising a first communication device operable to perform the steps of the method as described in the first aspect and a second communication device operable to perform the steps of the method as described in the second aspect.
In a tenth aspect, there is provided a chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being for running a program or instructions to implement the method according to the first aspect or to implement the method according to the second aspect.
In an eleventh aspect, there is provided a computer program/program product stored in a storage medium, the program/program product being executable by at least one processor to perform the steps of the method according to the first or second aspect.
In the embodiment of the application, the first triggering condition for performing source coding on the data to be transmitted is indicated through the first message, and the first communication equipment determines whether to perform source coding on the data to be transmitted based on whether the first triggering condition is met, so that the source coding of the data transmitted in the mobile network is supported, and the effect of saving storage resources and transmission resources is achieved.
Drawings
Fig. 1 is a block diagram of a wireless communication system to which embodiments of the present application are applicable;
Fig. 2 is a schematic diagram of a data plane protocol architecture terminating in a radio access network;
Fig. 3 is a schematic diagram of a data plane protocol architecture of a UE, a radio access network, and a core network;
FIG. 4 is a schematic flow chart of a source coding method according to an embodiment of the present application;
FIG. 5 is a second flow chart of a source coding method according to an embodiment of the application;
FIG. 6 is a schematic diagram of a source encoding device according to an embodiment of the present application;
FIG. 7 is a second schematic diagram of a source encoding device according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of a communication device according to an embodiment of the present application;
Fig. 9 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present application;
Fig. 10 is a schematic diagram of a hardware structure of a network side device according to an embodiment of the present application;
Fig. 11 is a second schematic diagram of a hardware structure of a network side device according to an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are derived by a person skilled in the art based on the embodiments of the application, fall within the scope of protection of the application.
The terms "first," "second," and the like, herein, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or otherwise described herein, and that the "first" and "second" distinguishing between objects generally are not limited in number to the extent that the first object may, for example, be one or more. Furthermore, the "or" in the present application means at least one of the connected objects. For example, "A or B" encompasses three schemes, namely scheme one including A and excluding B, scheme two including B and excluding A, scheme three including both A and B. The character "/" generally indicates that the context-dependent object is an "or" relationship.
The term "indication" according to the application may be either a direct indication (or an explicit indication) or an indirect indication (or an implicit indication). The direct indication may be understood that the sender explicitly informs the specific information of the receiver, the operation to be executed, the request result, and the like in the sent indication, and the indirect indication may be understood that the receiver determines the corresponding information according to the indication sent by the sender, or determines the operation to be executed, the request result, and the like according to the determination result.
It should be noted that the techniques described in the embodiments of the present application are not limited to long term evolution (Long Term Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems, but may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single-carrier frequency division multiple access (Single-carrier Frequency-Division Multiple Access, SC-FDMA), or other systems. The terms "system" and "network" in embodiments of the application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. The following description describes a New Radio (NR) system for exemplary purposes and the NR terminology is used in much of the description below, but the techniques are also applicable to systems other than NR systems, such as the 6th generation (6th Generation,6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application is applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may be a Mobile phone, a tablet Computer (Tablet Personal Computer), a Laptop (Laptop Computer), a notebook (Personal DIGITAL ASSISTANT, PDA), a palm Computer, a netbook, an Ultra-Mobile Personal Computer (Ultra-Mobile Personal Computer, UMPC), a Mobile internet device (Mobile INTERNET DEVICE, MID), a Personal Digital Assistant (PDA), Augmented Reality (Augmented Reality, AR), virtual Reality (VR) devices, robots, wearable devices (Wearable Device), aircraft (FLIGHT VEHICLE), in-vehicle devices (Vehicle User Equipment, VUE), on-board equipment, pedestrian terminals (PEDESTRIAN USER EQUIPMENT, PUE), smart home (home appliances having wireless communication function, such as refrigerator, television, Washing machine or furniture, etc.), game machine, personal computer (Personal Computer, PC), teller machine or self-service machine, etc. The wearable device comprises an intelligent watch, an intelligent bracelet, an intelligent earphone, intelligent glasses, intelligent jewelry (intelligent bracelets, intelligent rings, intelligent necklaces, intelligent anklets, intelligent footchains and the like), an intelligent wristband, intelligent clothing and the like. The in-vehicle apparatus may also be referred to as an in-vehicle terminal, an in-vehicle controller, an in-vehicle module, an in-vehicle component, an in-vehicle chip, an in-vehicle unit, or the like. It should be noted that the specific type of the terminal 11 is not limited in the embodiment of the present application. The network-side device 12 may include an access network device or core network device, where the access network device may also be referred to as a radio access network (Radio Access Network, RAN) device, a radio access network function, or a radio access network element. The Access network device may include a base station, a wireless local area network (Wireless Local Area Network, WLAN) Access Point (AS), or a wireless fidelity (WIRELESS FIDELITY, WIFI) node, etc. Wherein the base station may be referred to as Node B (NB), evolved Node B (eNB), next generation Node B (the next generation Node B, gNB), new air interface Node B (NR Node B), access point, relay station (Relay Base Station, RBS), serving base station (Serving Base Station, SBS), base transceiver station (Base Transceiver Station, BTS), A radio base station, a radio transceiver, a Basic service set (Basic SERVICE SET, BSS), an Extended service set (Extended SERVICE SET, ESS), a Home Node B (HNB), a home evolved Node B (home evolved Node B), a transmission and reception point (Transmission Reception Point, TRP), or some other suitable terminology in the art, so long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, and it should be noted that in the embodiment of the present application, only a base station in an NR system is described by way of example, and the specific type of the base station is not limited.
The core Network device may comprise a core Network device and may comprise at least one of, but not limited to, a core Network device, a core Network Function, a Mobility management entity (Mobility MANAGEMENT ENTITY, MME), an access Mobility management Function (ACCESS AND Mobility Management Function, AMF), a session management Function (Session Management Function, SMF), a user plane Function (User Plane Function, UPF), a Policy control Function (Policy Control Function, PCF), a Policy and charging Rules Function (Policy AND CHARGING Rules Function, PCRF), an edge application service discovery Function (Edge Application Server Discovery Function, EASDF), a Unified data management (Unified DATA MANAGEMENT, UDM), a Unified data repository (Unified Data Repository, UDR), a home subscriber server (Home Subscriber Server, HSS), a centralized Network configuration (Centralized Network configuration, CNC), a Network storage Function (Network Repository Function, NRF), a Network opening Function (Network Exposure Function, NEF), a Local NEF (Local, or L-NEF), a binding support Function (Binding Support Function, BSF), an application Function (Application Function, AF), a location management Function (Location Management Function, f), a gateway mobile location center (Gateway Mobile Location Centre, gmr), a Network data analysis (Network Function 6558, network data analysis (NWDAF, etc. It should be noted that, in the embodiment of the present application, only the core network device in the NR system is described as an example, and the specific type of the core network device is not limited.
The following describes the technical content related to the present application.
(1) Robust header compression (RObust Header Compression, ROHC)
ROHC is an algorithm that compresses various internet (internet) protocol (Internet Protocol, IP) packet headers. In IPv4, the uncompressed IP header size is 40 bytes, while in IPv6, the uncompressed IP header size is 60 bytes. This is not a big problem if it is a common packet application (such as file transfer or browsing) because the size of the transferred data is very large compared to the size of the header. Therefore, the overhead generated by the IP header is not a big problem. However, in some applications (e.g., internet telephony (Voice over Internet Protocol, voIP), short messages, games, etc.), the amount of data transmitted tends to be small and very frequent transactions can occur, in which case the overhead generated by the IP header can be very large. In this case, it would be very beneficial if any method could be devised to reduce the size of the IP header, and ROHC is one of the methods defined in RFC 3095. The ideal compression rate of ROHC is to reduce the size of the header (original size 40 or 60 bytes) to only 1 or 2 bytes.
The ROHC functional entity is located in the user plane packet data convergence protocol (PACKET DATE Convergence Protocol, PDCP) entity of the UE and eNodeB/gNB, only for header compression and decompression of the user plane packets. That is, ROHC is mainly directed to user data from outside the mobile network, which is carried by the mobile network, and header compression is performed on user data packets.
(2) Uplink data compression (Uplink Data Compression, UDC)
The UDC protocol is based on IETF RFC 1951 (DEFLATE compressed data format specification). The DEFLATE compression policy employs a static huffman coding tree as defined in IETF RFC 1951. The UDC data block should be byte aligned. The last four fixed bytes 0x00 0x00 0xFF 0xFF are deleted before transmission using z_sync_flush as a DEFLATE byte alignment.
The PDCP entity associated with the data radio bearer (Data Radio Bearer, DRB) may be configured by an upper layer to use the UDC. If the UDC is configured, the UE should apply the UDC compression function to process PDCP service data units (SERVICE DATA Unit, SDU) received from an upper layer corresponding to the configured DRB. If the upper layer configures the predefined dictionary, the UE should pre-fill the predefined dictionary of configuration in the compression buffer when configuring the UDC. If the upper layer is not configured with the predefined dictionary, the UE should set the compression buffer to all zeros.
It can be found that the UDC function is located in the user plane PDCP entity of the UE and eNodeB/gcb, only for compression and decompression of user plane packets. That is, the UDC is mainly directed to user data from outside the mobile network, which is carried by the mobile network, and compresses user data packets. And, each PDCP entity carrying user plane data uses either UDC or ROHC, which are not used at the same time.
(3) Data plane (DATA PLANE)
In the current 6G network architecture discussion, a data plane is proposed by many companies in the industry. The data plane consists of a core network data plane function, a radio access network data plane function and a UE data plane function, and has end-to-end connectivity. The data plane is responsible for data control including data collection coordination, data collection configuration, data transmission configuration, and the like. The data plane is also responsible for at least one of data collection, data transmission, data preprocessing, data privacy security, data analysis, data storage, data service, and the like.
Referring to fig. 2, fig. 2 is a schematic diagram of a data plane protocol architecture terminated in a radio access network, referring to fig. 3, fig. 3 is a schematic diagram of a data plane protocol architecture of a UE, a radio access network and a core network.
(4) Information source coding and decoding
The basic communication model of source codec is as follows, source (source) - > source encoder (source encoder) - > channel encoder (channel encoder) - > channel (channel) - > channel decoder) - > source decoder (channel decoder) - > sink (destination).
Wherein, the source is the carrier for sending out information. Where binary numbers are output by default.
A source encoder (source encoder) losslessly encodes (or losslessly encodes) the output of the source in order to reduce redundancy of the source output information. Can be understood as compression.
And a channel encoder (channel encoder) for encoding the output of the source encoder so that the obtained sequence can be transmitted in the channel well. Redundancy is typically added to enhance immunity.
A channel (channel) in which information is transmitted to a receiving end.
A channel decoder (source decoder) decodes the received sequence and can recover certain transmission errors.
And a channel decoder (channel decoder) for decoding the output of the channel decoder to recover the original information sequence.
A sink (destination) requires a carrier of the original information.
The source coding method, the device, the communication equipment and the readable storage medium provided by the embodiment of the application are described in detail below through some embodiments and application scenes thereof with reference to the accompanying drawings.
Referring to fig. 4, an embodiment of the present invention provides a source coding method, including:
Step 11, a first communication device receives a first message, wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted;
source coding is a type of conversion of source symbols for the purpose of improving communication efficiency, or for the purpose of reducing or eliminating source redundancy, and can be called data compression because it can reduce the size of source symbols.
In some embodiments, optionally, the first communication device receives a first message sent by the second communication device.
And step 12, the first communication equipment determines whether to perform source coding on the data to be transmitted according to whether the first trigger condition is met.
Optionally, the first communication device performs source coding on the data to be transmitted when the first trigger condition is met, and does not perform source coding on the data to be transmitted when the first trigger condition is not met.
In the embodiment of the present application, the first communication device is a data provider, which may also be referred to as a data providing function, and may be a UE, a radio access network device, or a core network device.
The second communication device may be a data consumer, which may also be referred to as a data consuming function. Or the second communication device may be a data plane function node, and the data provided by the data provider is provided to the data consumer via the data plane function node. The data plane function node may provide raw data provided by a data provider, or processed data. The second communication device may be a UE, a radio access network device or a core network device.
In the embodiment of the application, the first triggering condition for performing source coding on the data to be transmitted is indicated through the first message, and the first communication equipment determines whether to perform source coding on the data to be transmitted based on whether the first triggering condition is met, so that the source coding of the data transmitted in the mobile network is supported, and the effect of saving storage resources and transmission resources is achieved.
In addition, in the embodiment of the application, the first trigger condition for performing source coding on the data to be transmitted is indicated through the first message, and the first communication equipment determines whether to perform source coding on the data to be transmitted based on whether the first trigger condition is met, so that the flexibility of source coding and the efficiency of data transmission can be improved.
The data to be transmitted in the embodiment of the application can be user plane data or non-user plane data, namely mobile network internal data. The mobile network internal data may refer to data that can be parsed by the UE, the radio access network, or the core network in the 3GPP standard. The mobile network internal data includes at least one of:
1) Transmitting and receiving data terminated in any two of the terminal, the radio access network device and the core network device;
It may also be described as data where the peer-to-peer protocol of transmission and reception is located in the UE, radio access network or core network.
The peer-to-peer protocol layers, e.g. long term evolution positioning protocol (LTE Positioning Protocol, LPP), are located in the data of the location management functions (location management function, LMF) of the UE and the core network, respectively, the peer-to-peer protocol layers, e.g. radio resource control (Radio Resource Control, RRC), are located in the data of the UE and the radio access network device (eNB/gNB, base station), respectively, and the data plane protocol layers are located in the data of the UE and the radio access network device, or in the UE and the core network device, respectively.
2) Data terminating at any one of the terminal, the radio access network device, or the core network device is transmitted or received.
It may also be described as transmitting or receiving data with one end located in the UE, radio access network or core network. For example, an AI model generated by an application server or an application function outside the mobile network is sent to the UE, the radio access network device or the core network device, and the corresponding device needs to deploy and use the AI model.
The terminal (UE) related to the mobile network content data refers to a protocol function of a User equipment (User equipment) defined by a 3GPP protocol, and does not include an application function.
For example, the mobile network internal data may include at least one of perception data, positioning data, AI models, and AI model training data.
There may be a number of different ways for the collection and transmission of data within a mobile network. For example, to generate the required data by measuring configuration information and immediately transmitting the data on the configured resources, to generate the required data by measuring configuration information and the like, to determine when to transmit according to the UE status (e.g. idle or connected), network load condition, etc., to generate the required data by measuring configuration information and the like, to determine which data to transmit and how to transmit according to the performance index of the data and the effect of source coding.
In the embodiment of the application, optionally, the first trigger condition comprises at least one of a first trigger parameter, an identifier of a first trigger event, a trigger threshold value corresponding to the first trigger parameter, and a trigger threshold value corresponding to the trigger parameter described by the first trigger event.
Wherein the first trigger event identification is used to identify a trigger event, which may also be referred to as a trigger event type.
Optionally, the first trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
It should be noted that, the data length after source coding is not the data length after source coding determined after source coding is actually performed on the data to be transmitted, but the calculated data length before whether source coding is performed is not determined, for example, the data length of the data to be transmitted is 10, and the data length of the data length after source coding is 2, which indicates that the effect of source coding is obvious and source coding can be performed.
In an embodiment of the present application, optionally, the first triggering condition may include at least one of the following:
the data length before source coding is larger than or equal to a first trigger threshold value;
The data length-reference value before source coding is larger than or equal to a second trigger threshold value, wherein the reference value can be agreed by a protocol or determined by second communication equipment;
The length of the data after the source coding is smaller than or equal to a third trigger threshold value;
The data length after source coding plus a reference value is smaller than or equal to a fourth trigger threshold value, wherein the reference value can be agreed by a protocol or determined by second communication equipment;
the compression ratio is greater than or equal to a fifth trigger threshold;
the compression ratio-reference value is greater than or equal to a sixth trigger threshold value, wherein the reference value can be agreed by a protocol or determined by second communication equipment;
the length of the data before source coding is larger than or equal to the size of the data which can be transmitted by the transmission resource which can be used by the data to be transmitted;
The data length before source coding, the data size which can be transmitted by the transmission resource which can be used by the data to be transmitted, is larger than or equal to a seventh trigger threshold value;
the length of the data before source coding is larger than or equal to the size of the data which can be stored by the storage resource which can be used by the data to be transmitted;
the data length before source coding, the data size which can be transmitted by the storage resource which can be used by the data to be transmitted, is larger than or equal to an eighth trigger threshold value;
The time length of the source coding is smaller than or equal to a ninth trigger threshold value;
The length of time of source coding + the reference value is less than or equal to a tenth trigger threshold value, which may be agreed upon by the protocol or determined by the second communication device.
It should be noted that, in the above-mentioned different first trigger conditions, the threshold values corresponding to the same trigger parameters may be the same or different, for example, the first trigger threshold value and the second trigger threshold value may be the same or different. In the above-mentioned different first trigger conditions, the threshold values corresponding to the different trigger parameters may be the same or different, for example, the first trigger threshold value and the fourth trigger threshold value may be the same or different. In the above-mentioned different first trigger conditions, the reference values corresponding to the different trigger parameters may be the same or different.
In the embodiment of the application, the first message optionally further comprises a second trigger condition for ending the source coding of the data to be transmitted, and the method further comprises the step that the first communication equipment determines whether to close the source coding of the data to be transmitted according to whether the second trigger condition is met.
Optionally, the second triggering condition comprises at least one of a second triggering parameter and an identifier of a second triggering event, wherein the triggering threshold value corresponds to the second triggering parameter, and the triggering threshold value corresponds to the triggering parameter described by the second triggering event.
Optionally, the second trigger parameter includes at least one of:
The data length before source coding can also be called the input data length of source coding;
the data length after source coding can also be called source coding output data length;
The definition of the compression rate, the potential compression rate, for example, includes one of the following data length after source coding divided by the data length before source coding, the data length before source coding divided by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the uplink grant (UL grant) may be used to obtain a data size that may be transmitted by the UE;
the first communication device defined by the protocol is used for storing the storage resources of the data to be transmitted, for example, the protocol definition is used for recording the minimization of drive test (logged MDT), and the UE uses 64K storage resources at most.
The time length of source coding can also be called the processing time of the first communication device for source coding the data;
the time length of source decoding can also be called the processing time of the first communication equipment for source decoding the data;
the sum of the time lengths of source encoding and source decoding.
In the embodiment of the present application, the second trigger parameter in the second trigger condition may be the same as or different from the first trigger parameter in the first trigger condition.
An example of a source coded trigger event is described below.
Referring to table 1, the source code trigger event may include at least one of the following (note that, the name and sequence number of the trigger time in the table are only examples, and may be other):
TABLE 1
In an embodiment of the present application, optionally, the first message further includes at least one of the following:
First indication information for indicating the use of lossy source coding or lossless source coding;
The candidate source coding algorithm or algorithm identification, which indicates which source coding algorithm or algorithms the first communication device may use, may comprise at least one of a pre-defined algorithm in the protocol, a pre-deployment algorithm.
Buffer size (buffer size) for source coding;
Candidate source profiles (profiles) indicating which types and/or characteristics of sources may be source coded. For example, the type of source may be classified from data usage, and may be awareness, AI, or external data services, etc. Optionally, the information source can be further subdivided into target application scenes under the type, for example, the data of the perception type can be divided into target detection, target tracking, environment reconstruction and the like, the data of the AI type can be divided into AI model, AI model training data and the like, and the external data service can be divided into high-precision, medium-precision and low-precision data service and the like.
Candidate geographical area information that can be source coded.
In the prior art, the user plane data for mobile network transmission can reduce the data transmission amount by robust header compression (Robust Header Compression, ROHC) or uplink data compression (Uplink Data Compression, UDC), and improve the transmission efficiency. Since the existing scheme performs user plane data compression through a radio access network (Radio Access Network, RAN) packet data convergence protocol (PACKET DATA Convergence Protocol, PDCP) layer, compression methods adopted by ROHC and UDC are lossless compression, so that an influence on upper layer applications is avoided. In the embodiment of the application, the data to be transmitted, which is oriented to the source coding, can be the data (non-user plane data) in the mobile network, so that the proper source coding can be determined according to the application scene of the data to be transmitted, the requirement on the quality of the data and other specific conditions, the method is not limited to a lossless source coding algorithm, and a lossy source coding algorithm can be adopted.
In an embodiment of the present application, optionally, the candidate geographic area information includes at least one of the following:
Global Cell identity (Cell Global Identifier, CGI) including public land mobile network (Public Land Mobile Network, PLMN) ID and Cell (Cell) ID;
A physical cell identity (PHYSICAL CELL INDENTITY, PCI);
Carrier frequency information;
tracking area Code (TRACKING AREA Code, TAC);
tracking area identity (TRACKING AREA IDENTIFY, TAI), including PLMN ID and TAC;
For example, a geographic location area may be identified by a reference point (represented by a geographic coordinate) and a distance threshold, and for example, a geographic location area may be identified by a plurality of geographic coordinates;
A Radio Access Network (RAN) area, which may be identified by RAN AREA ID, includes a TAC and RAN area Code.
In the embodiment of the present application, optionally, the first message may further include at least one of a data name (or a data item) and a first index. The data name is used to indicate data that needs to be collected and reported by the first communication device, such as reference signal received Power (REFERENCE SIGNAL RECEIVED Power, RSRP), reference signal received Quality (REFERENCE SIGNAL RECEIVED Quality, RSRQ), PDCP DELAY, and the like. It may also be represented by defining a different value for a certain field, for example 0000 0001 is RSRP,0000 0010 is RSRQ, etc. The first index is used for indicating that the data meeting the first index in the collected data is required to be reported/transmitted. For example, the first index may be the degree of integrity (typically defined as measured from the degree of data acquisition, as the ratio between the data that should be acquired and the data that is actually acquired. For another example, the measured value in the case where the SNR is not lower than the threshold value is satisfied, and for another example, the threshold value is 0dB. For example, the first index may be set for the perceived data by a perceived SNR, where the perceived SNR is different from the SNR, and the perceived SNR refers to a signal-to-noise-power ratio of the target signal after the perceived signal is converted into at least one of the delay domain, the doppler domain, and the angle domain, and similarly, the perceived SINR may be a signal-to-interference-noise-power ratio of the target signal after the first signal is converted into at least one of the delay domain, the doppler domain, and the angle domain.
In the embodiment of the present application, optionally, the source coding method further includes that the first communication device sends source coding capability information of the first communication device, where the source coding capability information includes second indication information, and the second indication information is used to indicate whether the first communication device supports source coding.
In the embodiment of the present application, the second indication information may indicate, in an explicit manner, whether the first communication device supports source coding, or may indicate, in an implicit manner, whether the first communication device supports source coding.
Optionally, the first communication device sends source coding capability information of the first communication device to a second communication device, where the source coding capability information of the first communication device is used by the second communication device to determine the first message.
In an embodiment of the present application, optionally, the source coding capability information further includes at least one of the following:
the maximum number of entities supported using source coding, e.g., the maximum number of radio bearers;
third indication information for indicating support of at least one of lossy source coding and lossless source coding;
The supported source coding algorithm or algorithm identification may comprise at least one of a standard source coding algorithm (also referred to as a dictionary) and an operator defined source coding algorithm (also referred to as a dictionary). When the supported source coding algorithm comprises an operator defined source coding algorithm, the source coding capability information may also comprise an algorithm version and an operator PLMN.
The standard source coding algorithm may comprise at least one of a lossy source coding algorithm and a lossless source coding algorithm.
The lossless source coding algorithm is illustrated by way of example:
1) DeFLATE, a widely used lossless compression algorithm, is commonly used in ZIP, GZIP and other file formats. This source coding algorithm is employed in the existing protocol UDC.
2) LZ77/LZ78, a dictionary-based lossless compression algorithm, is commonly used in LZW, ZIP and other file formats.
3) Brotli A lossless compression algorithm developed by Google has the characteristics of high compression ratio and quick decompression, and has become one of the standards of Web content compression.
4) Zstandard A lossless compression algorithm developed by Facebook has the characteristics of high compression ratio and quick decompression, and has become one of the standards of a plurality of application fields.
5) LZ4 is a lossless compression algorithm developed by Google, has the characteristics of high compression speed and quick decompression, and is commonly used in scenes such as real-time data transmission, cache and the like.
6) Snappy, a lossless compression algorithm developed by Google, has the characteristics of high compression speed and rapid decompression, and is commonly used in scenes such as big data processing and real-time data transmission.
The lossy source coding algorithm is illustrated by way of example below:
1) JPEG, a widely used image compression algorithm, can compress the image to the original size of 1/10 to 1/100, and is commonly used in scenes such as digital cameras, mobile equipment, televisions and the like.
2) The MPEG is a widely used video compression algorithm, which can compress video to the original size of 1/100 to 1/1000, and is commonly used in scenes such as digital televisions, network videos, video conferences and the like.
3) AAC, a widely used audio compression algorithm, can compress audio to the original size of 1/10 to 1/20, and is commonly used in scenes such as digital music, network audio, mobile equipment and the like.
4) Opus, an audio compression algorithm developed by Xiph. Org, can compress audio to the original 1/10 to 1/20 size, has the characteristics of low delay and high quality, and has become one of the standards of WebRTC audio communication.
In the embodiment of the present application, when the first communication device is UE, the information of the source coding capability of the first communication device may be carried in the UE capability report.
In the embodiment of the present application, optionally, the source coding capability information is defined by a capability parameter of a data plane protocol layer or indicated by a general parameter in the capability parameters of the first communication device.
Optionally, in case the first communication device is a UE, the capability parameter of the first communication device is a UE capability parameter.
In other embodiments of the present application, the first communication device may also support source coding by defining the protocol, that is, the source coding is an essential feature, in which case the first communication device may not need to report source coding capability information.
In the embodiment of the present application, optionally, the source coding method further includes that the first communication device sends a second message, where the second message includes fourth indication information, where the fourth indication information is used to indicate whether data to be transmitted or transmitted is source coded.
Optionally, the first communication device sends the second message to a third communication device, and the third communication device may determine whether to perform source decoding and how to perform source decoding on the received data according to the second message. The third communication device may be the second communication device or may be another communication device different from the second communication device.
In an embodiment of the present application, optionally, the second message further includes at least one of the following:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
Source coded data or non-source coded data, which may also be referred to as source coded output data;
The check object may be a single source coded data packet, for example, the source coding end generates check bits (check bits) for the data before source coding through a check algorithm (for example, parity check), the receiving end receives the data packet, then performs source decoding, and the decoded data generates check bits through the same check algorithm. If the information source code is consistent with the check bit of the received code end, the information source code is considered to be correct, otherwise, the information source code is considered to be wrong.
A sequence number of the transmitted data;
The size of the data to be transmitted.
Referring to fig. 5, an embodiment of the present application further provides a source coding method, including:
And step 21, the second communication equipment sends a first message, wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted.
In the embodiment of the application, the second communication device indicates the first trigger condition for performing source coding on the data to be transmitted through the first message, and the receiving end of the first message can determine whether to perform source coding on the data to be transmitted or not based on the first trigger condition, so that the flexibility of source coding and the efficiency of data transmission can be improved.
In the embodiment of the application, optionally, the first trigger condition comprises at least one of a first trigger parameter, an identifier of a first trigger event, a trigger threshold value corresponding to the first trigger parameter, and a trigger threshold value corresponding to the trigger parameter described by the first trigger event.
Optionally, the first trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
In the embodiment of the present application, optionally, the first message further includes a second trigger condition for ending source coding for the data to be transmitted.
In the embodiment of the application, optionally, the second trigger condition comprises at least one of a second trigger parameter and a second trigger event identifier, wherein the second trigger parameter corresponds to a trigger threshold value, and the second trigger event describes the trigger threshold value corresponding to the trigger parameter.
In an embodiment of the present application, optionally, the second triggering parameter includes at least one of the following:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
In an embodiment of the present application, optionally, the first message further includes at least one of the following:
First indication information for indicating the use of lossy source coding or lossless source coding;
Candidate source coding algorithms or algorithm identifications;
Buffer size for source coding;
Candidate source profiles;
Candidate geographical area information that can be source coded.
In an embodiment of the present application, optionally, the candidate geographic area information includes at least one of the following:
global cell identification;
physical cell identification;
Carrier frequency information;
Tracking the area code;
Tracking a region identifier;
a geographic location area;
a radio access network area.
In the embodiment of the present application, optionally, the source coding method further includes:
The second communication device receives source coding capability information of the first communication device, wherein the source coding capability information comprises second indication information, and the second indication information is used for indicating whether the first communication device supports source coding or not;
The second communication device determines the first message according to the source coding capability information.
In an embodiment of the present application, optionally, the source coding capability information further includes at least one of the following:
The maximum number of entities supported using source coding;
third indication information for indicating support of at least one of lossy source coding and lossless source coding;
The supported source coding algorithm or algorithm identification.
In the embodiment of the present application, optionally, the source coding capability information is defined by a capability parameter of a data plane protocol layer or indicated by a general parameter in the capability parameters of the first communication device.
In the embodiment of the present application, optionally, the source coding method further includes that the second communication device receives a second message, where the second message includes fourth indication information, and the fourth indication information is used to indicate whether data to be transmitted or transmitted is source coded.
In an embodiment of the present application, optionally, the second message further includes at least one of the following:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
source coded data or non-source coded data;
Check bit, is used for waiting to transmit or the source code of the data transmitted to check;
a sequence number of the transmitted data;
The size of the data to be transmitted.
The source coding method according to the embodiment of the present application will be described below with reference to specific embodiments.
Example 1:
In this embodiment, the second communication device is a radio access network device, and the first communication device is a UE. In this embodiment, the second communication device is a radio access network device, and the first communication device is a UE, which illustrates a method for supporting source coding by a data plane protocol stack. If source coding is the capability of the data plane, the protocol layer corresponding to the data plane protocol stack is assumed to be called a first sublayer, and reference is made to the schematic diagram of the data plane protocol stack terminating in the data plane protocol architecture of the radio access network shown in fig. 2.
The source coding method in the embodiment of the application comprises the following steps:
first, the UE sends UE capability information to the network side device, where the UE capability information includes source coding capability information of the UE. This step is an optional step.
If the first sub-layer of the data plane protocol stack is referred to as the data plane application protocol (DATA PLANE application protocol, DPAP), an example of the UE capability information may be as follows.
The source coding capability information of the UE is defined by capability parameters of the data plane protocol layer. Wherein SourceCodingsSupported when true indicates that the UE supports source coding, supportedSourceCodingType is used to indicate that at least one of lossy source coding and lossless source coding is supported. supportedStandard-Profiles represent standard source coding algorithms. The standard source coding algorithm may comprise at least one of a lossy source coding algorithm and a lossless source coding algorithm. Examples of lossy source coding algorithms and lossless source coding algorithms are described in the above embodiments, and will not be described in detail.
SupportedOperator-Profiles represent operator defined source coding algorithms. Because the data to be transmitted in the embodiment of the application can be the internal data of the mobile network, an operator can define a source coding algorithm according to the application scene of the collected and transmitted data. Similar to the above described lossy source coding, which focuses on a certain class of data, operator defined source coding algorithms are expected to further reduce the amount of data transmitted. Considering that the UE may be multi-card for different operators, the algorithm version information and the corresponding PLMN identity need to be indicated for the operator-defined source coding algorithm.
If the source coding capability information is sent to the network side via the UE capability information, then there is a further potential way to indicate the source coding capability information via a common parameter (GENERAL PARAMETERS) in the UE capability parameters, as shown in table 2.
TABLE 2
In other embodiments of the present application, another way is to define the source coding supported by the UE and the network side through the protocol standard, that is, the source coding is an essential feature, in which case the UE may not need to report the source coding capability information.
The source coding method based on the trigger condition is generally used because the second communication device cannot accurately determine parameters (such as a data size, etc.) of the data to be transmitted of the first communication device. Therefore, the second communication device sends the triggering condition which needs to be subjected to source coding to the first communication device, and the first communication device judges whether to perform source coding according to specific conditions.
The following is a brief description of the procedure for performing trigger condition based source coding related interactions for a first communication device (UE) and a second communication device (radio access network device):
Step 1, a second communication device (wireless access network device) sends a first message to a first communication device (UE), wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted, and can also comprise a second trigger condition for ending source coding on the data to be transmitted. The first triggering condition and the second triggering condition comprise at least one triggering parameter and a triggering event identifier, and the triggering parameter or a triggering threshold value corresponding to the triggering parameter described by the triggering event.
An example first message includes one or more of the items of table 3 (table 3 is by way of example only, where each field may have meaning options, and combinations between different fields may be other, not limiting).
TABLE 3 Table 3
Optionally, the first message may further comprise at least one of a data name (or data item) and a first indicator. The data name is used to indicate data that needs to be collected and reported by the first communication device (UE), such as reference signal received Power (REFERENCE SIGNAL RECEIVED Power, RSRP), reference signal received Quality (REFERENCE SIGNAL RECEIVED Quality, RSRQ), PDCP DELAY, and the like. It may also be represented by defining a different value for a certain field, for example 00000001 as RSRP,0000 0010 as RSRQ, etc. The first index is used for indicating that the data meeting the first index in the collected data is required to be reported/transmitted. For example, the first index may be the degree of integrity (typically defined as measured from the degree of data acquisition, as the ratio between the data that should be acquired and the data that is actually acquired. For another example, the measured value in the case where the SNR is not lower than the threshold value is satisfied, and for another example, the threshold value is 0dB. For example, the first index may be set for the perceived data by a perceived SNR, where the perceived SNR is different from the SNR, and the perceived SNR refers to a signal-to-noise-power ratio of the target signal after the perceived signal is converted into at least one of the delay domain, the doppler domain, and the angle domain, and similarly, the perceived SINR may be a signal-to-interference-noise-power ratio of the target signal after the first signal is converted into at least one of the delay domain, the doppler domain, and the angle domain.
And 2, the first communication equipment (UE) receives the first message and determines whether to perform source coding according to the first message. Optionally, at least one of candidate source coding algorithms, source-coding enabled candidate geographic region information, is determined from the first message.
And 3, the first communication equipment (UE) sends a second message, wherein the second message comprises fourth indication information, and the fourth indication information is used for indicating whether the data to be transmitted or transmitted are source coded.
When the data to be transmitted or transmitted is source coded, optionally, the second message may further comprise at least one of:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
Source coded data or non-source coded data, which may also be referred to as source coded output data;
The check object may be a single source coded data packet, for example, the source coding end generates check bits (check bits) for the data before source coding through a check algorithm (for example, parity check), the receiving end receives the data packet, then performs source decoding, and the decoded data generates check bits through the same check algorithm. If the information source code is consistent with the check bit of the received code end, the information source code is considered to be correct, otherwise, the information source code is considered to be wrong.
A sequence number of the transmitted data;
The size of the data to be transmitted.
For example, the second message may be sent in one or more of the following ways:
Mode 1a first communication device (UE) sends a second message according to configuration information, the second message comprising fourth indication information, the fourth indication information being used to indicate whether data to be transmitted or transmitted is source coded.
And 2, the first communication equipment (UE) stores data according to the configuration information, and sends a second message to trigger data reporting according to the candidate geographical area information capable of carrying out source coding in the first message. The second message includes fourth indication information and a data size to be transmitted, where the fourth indication information is used to indicate whether the data to be transmitted is source coded.
Mode 3 the first communication device (UE) sends a second message according to the configuration information, the second message comprising fourth indication information and data, the fourth indication information being used to indicate whether the transmitted data is source coded.
The configuration information may include information in the first message, such as candidate geographical area information capable of performing source coding, and when the UE determines when to send the second message after collecting data, the UE needs to determine whether the current location is in the candidate geographical area according to the configured candidate geographical area, so as to determine whether to send the second message.
In addition, the configuration information may further include resource configuration information (e.g., on which time slot and frequency resource the second message is transmitted, etc.) set for the UE to report data.
And 4, the third communication equipment receives the second message and determines whether to perform source decoding and how to decode according to the second message. The third communication device may be a second communication device (radio access network device) or may be another communication device different from the second communication device (for example, the second communication device is a Centralized Unit-Control Plane (CU-CP), and the third communication device is a Centralized Unit-data Plane (Centralized Unit-DATA PLANE, CU-DP).
Example 2:
The difference between this embodiment and embodiment 1 is that the second communication device is a core network device, and may be, for example, a Sensing Function (SF), a location management Function (Location Management Function, LMF), or a Data Plane Function (DPF). This embodiment describes a method of supporting source coding by a sensing protocol (e.g., a sensing protocol) or a positioning protocol (LTE positioning protocol) or a data plane protocol (DATA PLANE). If the protocol layer corresponding to the data plane protocol stack is called the first data plane function protocol, reference may be made to the data plane protocol stack schematic diagram of the data plane protocol architecture of the UE, the radio access network and the core network shown in fig. 3.
The source coding method in the embodiment of the application comprises the following steps:
first, the UE sends UE capability information to the network side device, where the UE capability information includes source coding capability information of the UE. This step is an optional step.
For example, the information shown in table 4 may be added at 5GMM capability information element of the UE capability information based on the 5G protocol to indicate the source coding capability information of the UE:
TABLE 4 Table 4
In some embodiments, source coding may also be supported by LPP or SP protocols, and whether LPP capability is supported in existing 5GMM capability information element is also indicated as being supported in the positioning data.
The following is a brief description of the flow of source coding related interactions based on trigger conditions for a first communication device (UE) and a second communication device (core network device):
Step 1, a second communication device (core network device) sends a first message to a first communication device (UE), wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted, and can also comprise a second trigger condition for ending source coding on the data to be transmitted. The first triggering condition and the second triggering condition comprise at least one triggering parameter and a triggering event identifier, and the triggering parameter or a triggering threshold value corresponding to the triggering parameter described by the triggering event. An example first message includes one or more of table 3, which is not described in detail herein.
It should be noted that the scheduling resources are typically determined by the radio access network device, so that if the core network uses the data length before source coding and the data size that can be transmitted by the scheduled transmission resources as trigger conditions, the second communication device also typically needs to negotiate with the radio access network device.
And 2, the first communication equipment (UE) receives the first message and determines whether to perform source coding according to the first message. Optionally, at least one of candidate source coding algorithms, source-coding enabled candidate geographic region information, is determined from the first message.
And 3, the first communication equipment (UE) sends a second message, wherein the second message comprises fourth indication information, and the fourth indication information is used for indicating whether the data to be transmitted or transmitted are source coded.
When the data to be transmitted or transmitted is source coded, optionally, the second message may further comprise at least one of:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
Source coded data or non-source coded data, which may also be referred to as source coded output data;
The check object may be a single source coded data packet, for example, the source coding end generates check bits (check bits) for the data before source coding through a check algorithm (for example, parity check), the receiving end receives the data packet, then performs source decoding, and the decoded data generates check bits through the same check algorithm. If the information source code is consistent with the check bit of the received code end, the information source code is considered to be correct, otherwise, the information source code is considered to be wrong.
A sequence number of the transmitted data;
The size of the data to be transmitted.
And 4, the third communication equipment receives the second message and determines whether to perform source decoding and how to decode according to the second message. The third communication device may be a second communication device (core network device) or may be another communication device different from the second communication device (for example, the second communication device is an SF/LMF, and the third communication device is a DPF or radio access network device).
Example 3:
in this embodiment, the second communication device is a core network device, and the first communication device is a radio access network device.
Considering that the first communication device is typically limited in its power storage capacity, the first communication device determines whether to source encode based on the received first trigger condition and the collected data conditions.
First, existing protocols typically do not involve the capability definition of the radio access network device, if the subsequent release incorporates a source coding capability definition that can refer to the aforementioned UE and a registration to the node on the network side responsible for the registration of the radio access network device.
The source coding method in the embodiment of the application comprises the following steps:
Step 1, a second communication device (core network device) sends a first message to a first communication device (wireless access network device), wherein the first message comprises a first trigger condition for performing source coding on data to be transmitted, and can also comprise a second trigger condition for ending source coding on the data to be transmitted. The first triggering condition and the second triggering condition comprise at least one triggering parameter and a triggering event identifier, and the triggering parameter or a triggering threshold value corresponding to the triggering parameter described by the triggering event. An example first message includes one or more of table 3, which is not described in detail herein.
It is noted that there may be a variety of situations for the transmission resources involved in the trigger condition. Since data backhaul between core network devices and radio access network devices is typically performed using wired transmission, backhaul resources for operators are typically more abundant. Therefore, when the wired transmission resource is not limited, the present embodiment does not use the transmission resource as a trigger event. In addition, when the wired transmission resources are limited, the transmission resources are resources which are distributed to the data transmission to be transmitted by the wired network through a virtual private network (Virtual Private Network, VPN) and the like. Meanwhile, there is a case of wireless backhaul, and at this time, the transmission resource is a wireless resource for the core network device and the radio access network device to transmit the data to be transmitted.
And 2, the first communication equipment (wireless access network equipment) receives the first message and determines whether source coding is carried out according to the first message. Optionally, at least one of candidate source coding algorithms, source-coding enabled candidate geographic region information, is determined from the first message.
Step3, the first communication device (wireless access network device) sends a second message, wherein the second message comprises fourth indication information, and the fourth indication information is used for indicating whether the data to be transmitted or transmitted are source coded.
When the data to be transmitted or transmitted is source coded, optionally, the second message may further comprise at least one of:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
Source coded data or non-source coded data, which may also be referred to as source coded output data;
The check object may be a single source coded data packet, for example, the source coding end generates check bits (check bits) for the data before source coding through a check algorithm (for example, parity check), the receiving end receives the data packet, then performs source decoding, and the decoded data generates check bits through the same check algorithm. If the information source code is consistent with the check bit of the received code end, the information source code is considered to be correct, otherwise, the information source code is considered to be wrong.
A sequence number of the transmitted data;
The size of the data to be transmitted.
And 4, the third communication equipment receives the second message and determines whether to perform source decoding and how to decode according to the second message. The third communication device may be a second communication device (core network device) or may be another node than the second communication device (e.g. the second communication device is an SF/LMF and the third communication device is a data storage function DRF).
According to the source coding method provided by the embodiment of the application, the execution subject can be a source coding device. In the embodiment of the application, a source coding device is taken as an example to execute a source coding method.
Referring to fig. 6, an embodiment of the present application further provides a source coding device 30, including:
A first receiving module 31, configured to receive a first message, where the first message includes a first trigger condition for performing source coding on data to be transmitted;
a first determining module 32 is configured to determine whether to source encode the data to be transmitted according to whether the first trigger condition is satisfied.
In the embodiment of the application, the first triggering condition for performing source coding on the data to be transmitted is indicated through the first message, and the first communication equipment determines whether to perform source coding on the data to be transmitted based on whether the first triggering condition is met, so that the source coding of the data transmitted in the mobile network is supported, and the effect of saving storage resources and transmission resources is achieved.
Optionally, the first trigger condition comprises at least one of a first trigger parameter, an identifier of a first trigger event, a trigger threshold corresponding to the first trigger parameter, and a trigger threshold corresponding to the trigger parameter described by the first trigger event.
Optionally, the first trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
Optionally, the first message further includes a second trigger condition for ending source coding of the data to be transmitted, and the source coding device 30 further includes:
And the second determining module is used for determining whether to close source coding for the data to be transmitted according to whether the second triggering condition is met or not.
Optionally, the second triggering condition comprises at least one of a second triggering parameter and an identifier of a second triggering event, wherein the triggering threshold value corresponds to the second triggering parameter, and the triggering threshold value corresponds to the triggering parameter described by the second triggering event.
Optionally, the second trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
Optionally, the first message further includes at least one of:
First indication information for indicating the use of lossy source coding or lossless source coding;
Candidate source coding algorithms or algorithm identifications;
Buffer size for source coding;
Candidate source profiles;
Candidate geographical area information that can be source coded.
Optionally, the candidate geographic area information includes at least one of:
global cell identity CGI;
Physical cell identity PCI;
Carrier frequency information;
tracking an area code TAC;
Tracking area identification TAI;
a geographic location area;
RAN-based notification area (RAN-based Notification Area).
Optionally, the source coding device 30 further comprises:
the first sending module is used for sending source coding capability information of the first communication equipment, wherein the source coding capability information comprises second indication information, and the second indication information is used for indicating whether the first communication equipment supports source coding or not.
Optionally, the source coding capability information further includes at least one of:
The maximum number of entities supported using source coding;
third indication information for indicating support of at least one of lossy source coding and lossless source coding;
The supported source coding algorithm or algorithm identification.
Optionally, the source coding capability information is defined by a capability parameter of a data plane protocol layer or indicated by a general parameter of the capability parameters of the first communication device.
Optionally, the source coding device 30 further comprises:
and the second sending module is used for sending a second message, wherein the second message comprises fourth indicating information, and the fourth indicating information is used for indicating whether the data to be transmitted or transmitted is source coded or not.
Optionally, the second message further includes at least one of:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
source coded data or non-source coded data;
Check bit, is used for waiting to transmit or the source code of the data transmitted to check;
a sequence number of the transmitted data;
The size of the data to be transmitted.
The source coding device in the embodiment of the application can be an electronic device, for example, an electronic device with an operating system, or can be a component in the electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, the terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the present application are not limited in detail.
The source coding device provided by the embodiment of the present application can implement each process implemented by the method embodiment of fig. 4, and achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
Referring to fig. 7, an embodiment of the present application further provides a source coding apparatus 40, including:
A first sending module 41, configured to send a first message, where the first message includes a first trigger condition for performing source coding on data to be transmitted.
Optionally, the first trigger condition comprises at least one of a first trigger parameter, an identifier of a first trigger event, a trigger threshold corresponding to the first trigger parameter, and a trigger threshold corresponding to the trigger parameter described by the first trigger event.
Optionally, the first trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
Optionally, the first message further comprises a second trigger condition for ending source coding of the data to be transmitted.
Optionally, the second triggering condition comprises at least one of a second triggering parameter and an identifier of a second triggering event, wherein the triggering threshold value corresponds to the second triggering parameter, and the triggering threshold value corresponds to the triggering parameter described by the second triggering event.
Optionally, the second trigger parameter includes at least one of:
the data length before source coding;
The data length after source coding;
the definition of the compression rate comprises one of dividing the data length after source coding by the data length before source coding, dividing the data length before source coding by the data length after source coding, and 1-the data length after source coding/the data length before source coding;
the size of transmission resources which can be used by the data to be transmitted;
The size of the storage resource which can be used by the data to be transmitted;
The length of time of source coding;
the time length of source decoding;
the sum of the time lengths of source encoding and source decoding.
Optionally, the first message further includes at least one of:
First indication information for indicating the use of lossy source coding or lossless source coding;
Candidate source coding algorithms or algorithm identifications;
Buffer size for source coding;
Candidate source profiles;
Candidate geographical area information that can be source coded.
Optionally, the candidate geographic area information includes at least one of:
global cell identity CGI;
Physical cell identity PCI;
Carrier frequency information;
tracking an area code TAC;
Tracking area identification TAI;
a geographic location area;
RAN-based notification area (RAN-based Notification Area).
Optionally, the source coding device 40 further includes:
The first receiving module is used for receiving source coding capability information of the first communication equipment, wherein the source coding capability information comprises second indication information, and the second indication information is used for indicating whether the first communication equipment supports source coding or not;
and the determining module is used for determining the first message according to the source coding capability information.
Optionally, the source coding capability information further includes at least one of:
The maximum number of entities supported using source coding;
third indication information for indicating support of at least one of lossy source coding and lossless source coding;
The supported source coding algorithm or algorithm identification.
Optionally, the source coding capability information is defined by a capability parameter of a data plane protocol layer or indicated by a general parameter of the capability parameters of the first communication device.
Optionally, the source coding device 40 further includes:
And the second receiving module is used for receiving a second message, wherein the second message comprises fourth indication information, and the fourth indication information is used for indicating whether the data to be transmitted or transmitted are source coded or not.
Optionally, the second message further includes at least one of:
source coding algorithms or algorithm identifications to be transmitted or used by the transmitted data;
source coded data or non-source coded data;
Check bit, is used for waiting to transmit or the source code of the data transmitted to check;
a sequence number of the transmitted data;
The size of the data to be transmitted.
The source coding device provided by the embodiment of the present application can implement each process implemented by the method embodiment of fig. 5, and achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
As shown in fig. 8, the embodiment of the present application further provides a communication device 50, including a processor 51 and a memory 52, where the memory 52 stores a program or instructions executable on the processor 51, for example, when the communication device 50 is a first communication device, the program or instructions implement, when executed by the processor 51, the steps of the source coding method embodiment executed by the first communication device, and achieve the same technical effects. When the communication device 50 is a second communication device, the program or the instruction, when executed by the processor 51, implements the steps of the source coding method embodiment executed by the second communication device, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
The embodiment of the application also provides a terminal, which comprises a processor and a communication interface, wherein the communication interface is coupled with the processor, and the processor is used for running programs or instructions to realize the steps in the embodiment of the method shown in fig. 4. The terminal embodiment corresponds to the terminal-side method embodiment, and each implementation process and implementation manner of the method embodiment can be applied to the terminal embodiment, and the same technical effects can be achieved. Specifically, fig. 9 is a schematic diagram of a hardware structure of a terminal for implementing an embodiment of the present application.
The terminal 60 includes, but is not limited to, at least some of the components of a radio frequency unit 61, a network module 62, an audio output unit 63, an input unit 64, a sensor 65, a display unit 66, a user input unit 67, an interface unit 68, a memory 69, and a processor 610.
Those skilled in the art will appreciate that the terminal 60 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 610 by a power management system, such as to perform functions such as managing charging, discharging, and power consumption by the power management system. The terminal structure shown in fig. 9 does not constitute a limitation of the terminal, and the terminal may include more or less components than shown, or may combine some components, or may be arranged in different components, which will not be described in detail herein.
It should be appreciated that in embodiments of the present application, the input unit 64 may include a graphics processing unit (Graphics Processing Unit, GPU) 641 and a microphone 642, with the graphics processor 641 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 66 may include a display panel 661, and the display panel 661 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 67 includes at least one of a touch panel 671 and other input devices 672. The touch panel 671 is also referred to as a touch screen. The touch panel 671 may include two parts, a touch detection device and a touch controller. Other input devices 672 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
In the embodiment of the present application, after receiving the downlink data from the network side device, the radio frequency unit 61 may transmit the downlink data to the processor 610 for processing, and in addition, the radio frequency unit 61 may send the uplink data to the network side device. Typically, the radio frequency unit 61 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
Memory 69 may be used to store software programs or instructions as well as various data. The memory 69 may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 69 may include volatile memory or nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static random access memory (STATIC RAM, SRAM), dynamic random access memory (DYNAMIC RAM, DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate Synchronous dynamic random access memory (Double DATA RATE SDRAM, DDRSDRAM), enhanced Synchronous dynamic random access memory (ENHANCED SDRAM, ESDRAM), synchronous link dynamic random access memory (SYNCH LINK DRAM, SLDRAM), and Direct random access memory (DRRAM). Memory 69 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
The processor 610 may include one or more processing units, and optionally, the processor 610 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, etc., and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The radio frequency unit 61 is configured to receive a first message, where the first message includes a first trigger condition for performing source coding on data to be transmitted;
A processor 610 is configured to determine whether to source encode data to be transmitted according to whether the first trigger condition is satisfied.
In the embodiment of the application, the first triggering condition for performing source coding on the data to be transmitted is indicated through the first message, and the first communication equipment determines whether to perform source coding on the data to be transmitted based on whether the first triggering condition is met, so that the source coding of the data transmitted in the mobile network is supported, and the effect of saving storage resources and transmission resources is achieved.
Or the radio frequency unit 61 is configured to send a first message, where the first message includes a first trigger condition for source coding data to be transmitted.
In the embodiment of the application, the first trigger condition for performing source coding on the data to be transmitted is indicated by the first message, and the receiving end of the first message can determine whether to perform source coding on the data to be transmitted based on the first trigger condition, so that the flexibility of source coding and the efficiency of data transmission can be improved.
It can be appreciated that the implementation process of each implementation manner mentioned in this embodiment may refer to the related description of the method embodiment shown in fig. 4 or fig. 5, and achieve the same or corresponding technical effects, which are not repeated herein.
The embodiment of the application also provides network side equipment, which comprises a processor and a communication interface, wherein the communication interface is coupled with the processor, and the processor is used for running programs or instructions to realize the steps of the method embodiment shown in fig. 4 or 5. The network side device embodiment corresponds to the method embodiment shown in fig. 4 or fig. 5, and each implementation process and implementation manner of the method embodiment are applicable to the network side device embodiment, and the same technical effects can be achieved.
Specifically, the embodiment of the application also provides network side equipment. As shown in fig. 10, the network-side apparatus 70 includes an antenna 71, a radio frequency device 72, a baseband device 73, a processor 74, and a memory 75. The antenna 71 is connected to a radio frequency device 72. In the uplink direction, the radio frequency device 72 receives information via the antenna 71, and transmits the received information to the baseband device 73 for processing. In the downlink direction, the baseband device 73 processes information to be transmitted, and transmits the processed information to the radio frequency device 72, and the radio frequency device 72 processes the received information and transmits the processed information through the antenna 71.
The method performed by the network side device in the above embodiment may be implemented in the baseband apparatus 73, where the baseband apparatus 73 includes a baseband processor.
The baseband device 73 may, for example, comprise at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 7, where one chip, for example, a baseband processor, is connected to the memory 75 through a bus interface, so as to invoke a program in the memory 75 to perform the network device operation shown in the above method embodiment.
The network-side device may also include a network interface 76, such as a common public radio interface (Common Public Radio Interface, CPRI).
Specifically, the network side device 70 of the embodiment of the present application further includes instructions or programs stored in the memory 75 and capable of running on the processor 74, and the processor 74 calls the instructions or programs in the memory 75 to execute the method executed by each module shown in fig. 6 or fig. 7, and achieves the same technical effects, so that repetition is avoided and therefore, the description is omitted herein.
Specifically, the embodiment of the application also provides network side equipment. As shown in fig. 11, the network-side device 80 includes a processor 81, a network interface 82, and a memory 83. The network interface 82 is, for example, a common public radio interface (common public radio interface, CPRI).
Specifically, the network side device 80 of the embodiment of the present application further includes instructions or programs stored in the memory 83 and capable of running on the processor 81, and the processor 81 invokes the instructions or programs in the memory 83 to execute the method executed by each module shown in fig. 4 or fig. 5, so as to achieve the same technical effect, and thus, for avoiding repetition, the description is omitted herein.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, which when executed by a processor, implements each process of the above-mentioned source coding method embodiment, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here.
Wherein the processor is a processor in the terminal described in the above embodiment. The readable storage medium includes computer readable storage medium such as computer readable memory ROM, random access memory RAM, magnetic or optical disk, etc. In some examples, the readable storage medium may be a non-transitory readable storage medium.
The embodiment of the application further provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running programs or instructions, the processes of the source coding method embodiment can be realized, the same technical effects can be achieved, and the repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
The embodiments of the present application further provide a computer program/program product, where the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement each process of the foregoing source coding method embodiment, and the same technical effects are achieved, so that repetition is avoided and details are not repeated herein.
The embodiment of the application also provides a communication system, which comprises a first communication device and a second communication device, wherein the first communication device can be used for executing the steps of the source coding method executed by the first communication device, and the second communication device can be used for executing the steps of the source coding method executed by the second communication device.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the description of the embodiments above, it will be apparent to those skilled in the art that the above-described example methods may be implemented by means of a computer software product plus a necessary general purpose hardware platform, but may also be implemented by hardware. The computer software product is stored on a storage medium (such as ROM, RAM, magnetic disk, optical disk, etc.) and includes instructions for causing a terminal or network side device to perform the methods according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms of embodiments may be made by those of ordinary skill in the art without departing from the spirit of the application and the scope of the claims, which fall within the protection of the present application.
Claims (35)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311657295.5A CN120111569A (en) | 2023-12-05 | 2023-12-05 | Source coding method, device, communication equipment and readable storage medium |
| PCT/CN2024/136772 WO2025119222A1 (en) | 2023-12-05 | 2024-12-04 | Information source coding methods and apparatuses, communication devices and readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311657295.5A CN120111569A (en) | 2023-12-05 | 2023-12-05 | Source coding method, device, communication equipment and readable storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN120111569A true CN120111569A (en) | 2025-06-06 |
Family
ID=95879774
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311657295.5A Pending CN120111569A (en) | 2023-12-05 | 2023-12-05 | Source coding method, device, communication equipment and readable storage medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN120111569A (en) |
| WO (1) | WO2025119222A1 (en) |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107888331A (en) * | 2016-09-30 | 2018-04-06 | 中兴通讯股份有限公司 | Data transmission method for uplink, device and information source |
| CN115134047B (en) * | 2021-03-29 | 2024-09-13 | 维沃移动通信有限公司 | Transmission method, device, equipment and readable storage medium |
| CN116112120A (en) * | 2021-11-11 | 2023-05-12 | 华为技术有限公司 | Method and communication device for transmitting data |
| CN116156550A (en) * | 2021-11-23 | 2023-05-23 | 华为技术有限公司 | An information processing method and device |
-
2023
- 2023-12-05 CN CN202311657295.5A patent/CN120111569A/en active Pending
-
2024
- 2024-12-04 WO PCT/CN2024/136772 patent/WO2025119222A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| WO2025119222A1 (en) | 2025-06-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104348811A (en) | Method and device for detecting attack of DDoS (distributed denial of service) | |
| CN116155875A (en) | Method and communication device for data transmission | |
| US12284389B2 (en) | Video codec aware radio access network configuration and unequal error protection coding | |
| US20250301153A1 (en) | Video codec importance indication and radio access network awareness configuration | |
| WO2022001822A1 (en) | Method and device for acquiring neural network | |
| CN110892679B (en) | Management plane performance indicator delivery | |
| CN115334574A (en) | Application layer measuring method and related device | |
| WO2023185790A1 (en) | Information transmission method and apparatus, terminal, and network side device | |
| US20240184632A1 (en) | A method and apparatus for enhanced task grouping | |
| CN116233921A (en) | Data packet processing method, device and terminal | |
| CN107615810B (en) | Packet header compression system and method for online network code | |
| CN120111569A (en) | Source coding method, device, communication equipment and readable storage medium | |
| WO2025130710A1 (en) | Semantic communication method and related apparatus | |
| CN120111571A (en) | Source coding method, device, communication equipment and readable storage medium | |
| US9729867B2 (en) | Wireless communication terminal and communication control method | |
| CN120111570A (en) | Source coding method, device, communication equipment and readable storage medium | |
| CN107580339B (en) | Information transmission method, device and wireless communication system | |
| EP4255076A2 (en) | Performance metrics format adaptation | |
| WO2024060064A1 (en) | Miracast end to end (e2e) stream transmission | |
| WO2024073877A1 (en) | Wireless communication method and device | |
| US12323852B2 (en) | Reducing network traffic | |
| WO2025119360A1 (en) | Coding configuration method and apparatus, terminal, device, and medium | |
| CN120090758A (en) | Electronic device, method and storage medium for wireless communication system | |
| WO2024230977A1 (en) | Apparatuses, methods and computer programs for updating two-sided model | |
| WO2024027682A1 (en) | Feature information transmission method and apparatus, conversion information determination method and apparatus, and communication device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication |